Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/06/2024, 01:16

General

  • Target

    ##!!SetUp_5566_Pa$sW0rd$$!!/hogg.pptx

  • Size

    85KB

  • MD5

    4a1bb50a70821601f854cb93681f57a1

  • SHA1

    be7d7dabd24c40066f301499dae299cb90afd8c1

  • SHA256

    4db21e4665018a3e6cd03ec1b65f42a1c6c8f8046b3f451a1e025a2013e8203f

  • SHA512

    c8157213c3232cefc4e2d075091b1b848b67b2a802244e368223a89e22ee90e8b46f0e5f6c09ecb251ada5c4fe9325d1009fc81f31baa1e1367923a879fd4f7a

  • SSDEEP

    1536:zD9bYCak3t5H8JDtUetbmzSniODDjrghDiR8ID5hHKRwh:zDKPpTAzQoYmRo

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\##!!SetUp_5566_Pa$sW0rd$$!!\hogg.pptx"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2024

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1652-0-0x000000002DA01000-0x000000002DA02000-memory.dmp

      Filesize

      4KB

    • memory/1652-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1652-2-0x000000007219D000-0x00000000721A8000-memory.dmp

      Filesize

      44KB

    • memory/1652-5-0x000000007219D000-0x00000000721A8000-memory.dmp

      Filesize

      44KB

    • memory/1652-6-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1652-7-0x000000007219D000-0x00000000721A8000-memory.dmp

      Filesize

      44KB